City: unknown
Region: unknown
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.99.225.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.99.225.212. IN A
;; AUTHORITY SECTION:
. 552 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:32:28 CST 2022
;; MSG SIZE rcvd: 106
212.225.99.14.in-addr.arpa domain name pointer static-212.225.99.14-tataidc.co.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
212.225.99.14.in-addr.arpa name = static-212.225.99.14-tataidc.co.in.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 157.55.39.52 | attack | Automatic report - Banned IP Access |
2019-10-05 16:39:50 |
| 175.213.185.129 | attackspam | [Aegis] @ 2019-10-05 06:11:52 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-10-05 16:21:09 |
| 117.66.243.77 | attack | 2019-10-05T07:55:29.979518abusebot-5.cloudsearch.cf sshd\[29360\]: Invalid user robert from 117.66.243.77 port 57568 |
2019-10-05 16:33:35 |
| 188.254.0.183 | attackspam | $f2bV_matches |
2019-10-05 16:42:29 |
| 59.10.5.156 | attack | Oct 5 10:33:43 vps691689 sshd[10409]: Failed password for root from 59.10.5.156 port 59818 ssh2 Oct 5 10:38:15 vps691689 sshd[10464]: Failed password for root from 59.10.5.156 port 55310 ssh2 ... |
2019-10-05 16:47:50 |
| 92.119.160.142 | attackbotsspam | Oct 5 08:24:46 h2177944 kernel: \[3132825.800824\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=21090 PROTO=TCP SPT=44934 DPT=4105 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 5 08:39:19 h2177944 kernel: \[3133698.678069\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=22897 PROTO=TCP SPT=44934 DPT=3335 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 5 08:44:13 h2177944 kernel: \[3133992.400132\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=14332 PROTO=TCP SPT=44934 DPT=3314 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 5 08:46:26 h2177944 kernel: \[3134125.237810\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=2417 PROTO=TCP SPT=44934 DPT=27016 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 5 09:07:11 h2177944 kernel: \[3135370.637432\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214. |
2019-10-05 16:46:29 |
| 60.166.89.173 | attackspambots | CN China - Failures: 20 ftpd |
2019-10-05 16:44:49 |
| 144.217.214.13 | attack | Oct 4 19:22:04 auw2 sshd\[15547\]: Invalid user Qwerty\#123 from 144.217.214.13 Oct 4 19:22:04 auw2 sshd\[15547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip13.ip-144-217-214.net Oct 4 19:22:07 auw2 sshd\[15547\]: Failed password for invalid user Qwerty\#123 from 144.217.214.13 port 40774 ssh2 Oct 4 19:26:48 auw2 sshd\[15963\]: Invalid user 123Gate from 144.217.214.13 Oct 4 19:26:48 auw2 sshd\[15963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip13.ip-144-217-214.net |
2019-10-05 16:51:46 |
| 213.100.250.96 | attackbots | (sshd) Failed SSH login from 213.100.250.96 (EE/Estonia/-/-/static-213-100-250-96.cust.tele2.ee/[AS1257 TELE2]): 1 in the last 3600 secs |
2019-10-05 16:35:26 |
| 1.58.113.175 | attack | Fail2Ban - FTP Abuse Attempt |
2019-10-05 16:29:57 |
| 123.206.81.59 | attack | $f2bV_matches |
2019-10-05 16:18:01 |
| 134.209.56.60 | attackbotsspam | Oct 5 10:18:25 v22019058497090703 sshd[28551]: Failed password for root from 134.209.56.60 port 33116 ssh2 Oct 5 10:22:21 v22019058497090703 sshd[28870]: Failed password for root from 134.209.56.60 port 43014 ssh2 ... |
2019-10-05 16:28:28 |
| 51.75.65.209 | attack | SSH brute-force: detected 13 distinct usernames within a 24-hour window. |
2019-10-05 16:43:22 |
| 201.55.199.143 | attackspambots | Oct 5 07:55:33 venus sshd\[29546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143 user=root Oct 5 07:55:36 venus sshd\[29546\]: Failed password for root from 201.55.199.143 port 41368 ssh2 Oct 5 08:04:14 venus sshd\[29645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143 user=root ... |
2019-10-05 16:30:51 |
| 171.248.155.239 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2019-10-05 16:44:18 |